General

  • Target

    zloader 2_1.1.20.0.vir

  • Size

    575KB

  • Sample

    200719-259yta8gks

  • MD5

    7d8bb43c8776981c2c75313cf67175f0

  • SHA1

    d3895f0e4116c045c4e13ea478643e64b1ebf12d

  • SHA256

    da550540689b015b44a2e03f37c23ed8c8730ccf9cb611490dc76a39782dce2b

  • SHA512

    b74bf507bf7729ad0f231308bfcbdd36fe12dd8dcd687724d2e2e038422bcdd0e1204f59977b27988e2913329e99f7804243d9be860ae615e21154a85ffd91b5

Malware Config

Targets

    • Target

      zloader 2_1.1.20.0.vir

    • Size

      575KB

    • MD5

      7d8bb43c8776981c2c75313cf67175f0

    • SHA1

      d3895f0e4116c045c4e13ea478643e64b1ebf12d

    • SHA256

      da550540689b015b44a2e03f37c23ed8c8730ccf9cb611490dc76a39782dce2b

    • SHA512

      b74bf507bf7729ad0f231308bfcbdd36fe12dd8dcd687724d2e2e038422bcdd0e1204f59977b27988e2913329e99f7804243d9be860ae615e21154a85ffd91b5

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Blacklisted process makes network request

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks